簡易檢索 / 詳目顯示

研究生: 李仁傑
Ren-Jie Li
論文名稱: Data hiding in binary images for annotation by parity check
用奇偶性質為二元影像註解之資料隱藏法
指導教授: 張隆紋
Long-Wen Chang
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2006
畢業學年度: 94
語文別: 英文
論文頁數: 41
中文關鍵詞: 樣版奇偶性
外文關鍵詞: pattern, parity
相關次數: 點閱:1下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來,資訊嵌入或資訊隱藏的技術愈來愈多,其目的是讓我們能夠藏入額外的資料在原本的檔案裡。而這些檔案的類型有很多種,例如圖檔、影片檔和音訊檔案。資料嵌入可以用於保護著作權和秘密通訊等領域上。
    這些隱藏的技術,大體上可以分成二種類型:一種是在空間域(spatial domain),而另一種則是在頻率域(Frequency domain)中嵌入資料。在空間域裡,主要的原理就是小幅度地改變原始影像的像素值,使得人眼不易察覺,進而達到隱藏資料的目的。在頻率域中,則是利用了人眼對於高頻訊號不易感知的原理,所以我們可以對高頻訊號加以改變,仍使肉眼不易看出改變之處,而達到資料隱藏的目標。
    現今大部份的資料隱藏方法,大多都著墨於彩色和灰階色域之上,而鮮少有方法是針對純粹黑白兩色的影像。這主要是因為彩色和灰階的影像中,每一像素值的範圍很大(0~255),若我們輕微更改其像素值,人眼不易發覺;然而在黑白的影像之中,改變少部份的像素值,人眼卻對此影像很敏感,因此黑白影像的資料隱藏方法很少有人提及。
    本篇論文即是要提出一套在黑白影像中嵌入資料的方法。此方法是先對整張影像作一次前處理,以避免模稜兩可(ambiguity)的問題發生。再來就是根據定義好的參數,找出可以藏入資料的樣版(pattern)。而藏入的方法則是看此樣本的黑像素的個數,若為偶數,則代表藏入”0”;若為奇數,則代表藏入”1”。此方法對於文字文件、中國毛筆字、以及手寫簽名字等黑白影像表現特別好,而且在取出資料時,不必事先知道原本的檔案大小以及範圍,只要確實地把整個藏入後的部份都包含進來即可進行解碼的動作,實在是一項方便又強大的優點。


    A simple data hiding technique for binary images is proposed. It is a “pattern” based method instead of block based like most of others. The embedding rules are as follows: If the number of black pixels in a pattern is even, it implies that this pattern embeds a “0”. If the number of black pixels in a pattern is odd, it implies that this pattern embeds a “1”. It adds one black pixel at the left or right hand side of the pattern to fit the embedding rules. We use a weighting mechanism to determine which side we can add well. Before embedding, we apply a pre-processing to the binary image to avoid the ambiguous problem. The pre-processing may increase capacity of the image. This method is suit for binary images, especially good for text document, Chinese calligraphy, and hand-writings. We can extract the data from the binary image without prior knowledge of the original size of the image.

    ABSTRACT (in Chinese)..…………………….………....i ABSTRACT (in English)………………………….…......ii ACKNOWLEDGEMENT……………………………....iii List of Contents.................................................................iv List of Figures....................................................................v List of Tables.....................................................................vi Chapter 1 Introduction.......................................................1 Chapter 2 Related-work.....................................................3 Chapter 3 The proposed Method…………………...........4 Chapter 4 Experimental Results.......................................16 Chapter 5 Conclusions………………………………….39 Reference.........................................................................40

    References
    [1] Guorong Xuan; Chengyun Yang; Yizhan Zhen; Shi, Y.Q.; Zhicheng Ni, “Reversible Data Hiding Based on Wavelet Spread Spectrum,” Multimedia Signal Processing, 2004 IEEE 6th Workshop on 29 Sept.-1 Oct. 2004 Page(s):211 - 214
    [2] Inoue, H.; Miyazaki, A.; Katsura, T., “Wavelet-Based Watermarking For Tamper Proofing Of Still Images,” Image Processing, 2000. Proceedings. 2000 International Conference on Volume 2, 10-13 Sept. 2000 Page(s):88 - 91 vol.2
    [3] Bian Yang; Schmucker, M.; Xiamu Niu; Busch, C.; Shenghe Sun, “Reversible image watermarking by histogram modification for integer DCT coefficients,” Multimedia Signal Processing, 2004 IEEE 6th Workshop on 29 Sept.-1 Oct. 2004 Page(s):143 – 146
    [4] Kamstra, L.; Heijmans, H.J.A.M., “Reversible Data Embedding Into Images Using Wavelet Techniques and Sorting,” Image Processing, IEEE Transactions on
    Volume 14, Issue 12, Dec. 2005 Page(s):2082 – 2090
    [5] Guorong Xuan; Chengyun Yang; Yizhan Zhen; Shi, Y.Q.; Zhicheng Ni, “Reversible Data Hiding Based on Wavelet Spread Spectrum,” Multimedia Signal Processing, 2004 IEEE 6th Workshop on 29 Sept.-1 Oct. 2004 Page(s):211 – 214
    [6]Ho, A.T.S.; Xunzhan Zhu; Woon, W.M., “A Semi-Fragile Pinned Sine Transform Watermarking System For Content Authentication of Satellite Images,” Geoscience and Remote Sensing Symposium, 2005. IGARSS '05 Proceedings. 2005 IEEE International Volume 2, 25-29 July 2005 Page(s):4 pp.
    [7] Komatsu, K.; Sezaki, K., “Reversible Discrete Cosine Transform,” Acoustics, Speech, and Signal Processing, 1998. ICASSP '98. Proceedings of the 1998 IEEE International Conference on Volume 3, 12-15 May 1998 Page(s):1769 - 1772 vol.3
    [8] Yonghong Zeng; Lizhi Cheng; Guoan Bi; Kot, A.C., “Integer DCTs and fast algorithms,” Signal Processing, IEEE Transactions on [see also Acoustics, Speech, and Signal Processing, IEEE Transactions on] Volume 49, Issue 11, Nov. 2001 Page(s):2774 – 2782
    [9] Jun Tian, “Reversible Data Embedding Using a Difference Expansion,” Circuits and Systems for Video Technology, IEEE Transactions on Volume 13, Issue 8, Aug. 2003 Page(s):890 - 896
    [10] De Vleeschouwer, C.; Delaigle, J.-F.; Macq, B., “Circular Interpretation of Bijective Transformations in Lossless Watermarking for Media Asset Management,” Multimedia, IEEE Transactions on Volume 5, Issue 1, March 2003 Page(s):97 - 105
    [11] Tung-Hsiang Liu, “An adaptive data hiding technique for binary images,” Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on Volume 4, 23-26 Aug. 2004 Page(s):831 - 833 Vol.4
    [12] Min Wu and Bede Liu, “Data hiding in binary image for authentication and annotation,” Multimedia, IEEE Transactions on Volume 6, Issue 4, Aug. 2004 Page(s):528 – 538
    [13] E. Koch, J. Zhao, “Embedding robust labels into images for copyright protection”, Proceedings of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Techniques, 1995.
    [14] Min Wu and Bede Liu, “Multimedia Data Hiding,” 2002, ISBN 0-387-95426-0

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE